Implementing Electronic Commerce Security

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Threats and Protection Mechanisms
Implementing Electronic Commerce Security Gary Schneider, 2003
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
5/4/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Chapter 10: Electronic Commerce Security
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Cryptography and Network Security Chapter 17
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Implementing Security for Electronic Commerce
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Implementing Security for Electronic Commerce
Chapter 10: Electronic Commerce Security
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Security Threats to Electronic Commerce
12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of.
E-Commerce: The Second Wave Fifth Annual Edition
Chapter 8 Web Security.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1 Chapter 8: Security in Electronic Commerce IT357 Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
1 E-Commerce Security Part II – Security Techniques.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Electronic commerce Threats
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Implementing Security for Electronic Commerce
Cryptography and Network Security
Presentation transcript:

Implementing Electronic Commerce Security Chapter 11 Implementing Electronic Commerce Security

Learning Objectives In this chapter, you will learn: About security measures that can reduce or eliminate intellectual property theft How to secure client computers from attack by viruses and by ill-intentioned programs and scripts downloaded in Web pages How to authenticate users to servers and how to authenticate servers About the protection mechanisms that are available to secure information sent between a client and a server so that the information remains private

Learning Objectives (cont.) How to secure message integrity, preventing another program from altering information as it travels on the Internet How firewalls can protect intranets and corporate servers against being attacked through the Internet The role that the Secure Socket Layer, Secure HyperText Transfer Protocol, and secure electronic transaction protocols play in protecting electronic commerce.

Protecting Electronic Commerce Assets Security is a serious issue. Customers engaging in electronic commerce need to feel confident that their transactions are secure from prying eyes safe from alteration. The security policy must be regularly revised as threat conditions change. A security policy must protect a system’s privacy, integrity, and availability and authenticate users.

Protecting Electronic Commerce Assets

Protecting Intellectual Property Digital intellectual properties, including art, logos, and music posted on Web sites, are protected by laws. The U.S. Department of Justice maintains the Cybercrime site to provide information and updates on hacking, software piracy, and the latest security information, as well as the latest information on cyber crime prosecutions.

Protecting Intellectual Property The Information Technology Association of America (ITAA) has proposed some solutions to the current problems in digital copyright protection, including the following: Host name blocking Packet filtering Proxy servers

Organizations Providing Digital Watermarking Verance Corporation Blue Spike Secure Digital Music Initiative Digimarc Corporation

Protecting Privacy Cookies contain private information that can include credit card data, passwords, and login information. The privacy problems exists because of the existence of cookies. The best way to protect your privacy is to disable cookies entirely.

Protecting Client Computers Client computers must be protected from threats. Active contents can be one of the most serious threats to client computers. Another threat to client computers is a malevolent server site masquerading as a legitimate Web site.

Monitoring Active Content Netscape Navigator and Microsoft Internet Explorer browsers are equipped to recognize when they are about to download Web page containing active content. When a user downloads Web pages and runs programs that are embedded in them, it gives the user a chance to confirm that the programs are from a known and trusted source.

Digital Certificates A digital certificate verifies that a user or Web site is who it claims to be. The digital certificate contains a means for sending an encrypted message to the entity that sent the original Web page or e-mail message. A Web site’s digital certificate is a shopper’s assurance that the Web site is the real store.

Digital Certificates

Digital Certificates

Certification Authority (CA) A certification authority issues a digital certificate to an organization or individual. A key is usually a long binary number to be used with the encryption algorithm. Longer keys provide significantly better protection than shorter keys.

Microsoft Internet Explorer Internet Explorer provides client-side protection inside the browser. Internet Explorer uses Microsoft Authenticode technology. Authenticode technology verifies that the program has a valid certificate.

Microsoft Internet Explorer

Microsoft Internet Explorer

Microsoft Internet Explorer

Netscape Navigator Netscape Navigator allows you to control whether active content is downloaded to your computer. If you allow Java or JavaScript active content, you will always receive an alert from Netscape Navigator.

Netscape Navigator

Netscape Navigator

Netscape Navigator

Using Antivirus Software Antivirus software is a defense strategy. One of the most likely places to find a virus is in an electronic mail attachment. Application service providers (ASPs), such as Critical Path and MessageClick, supply e-mail services to companies to eliminate e-mail virus problems.

Computer Forensics Experts A small group of firms whose job it is to break into client computers. Computer forensics experts are hired to probe PCs. The field of computer forensics is for the collection, preservation, and analysis of computer-related evidence.

Protecting Electronic Commerce Channels Providing commerce channel security means: Providing channel secrecy Guaranteeing message integrity Ensuring channel availability A complete security plan includes authentication Businesses must prevent eavesdroppers from reading the Internet messages that they intercept.

Encryption Encryption is the coding of information by a mathematically based program and a secret key to produce a string of characters that is unintelligible. The program that transforms text into cipher text is called an encryption program. Upon arrival, each message is decrypted using a decryption program.

Three Types of Encryption “Hash coding” is a process that uses a hash algorithm to calculate a hash value from a message. “Asymmetric encryption,” or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key. “Symmetric encryption,” or private-key encryption, encodes a message using a single numeric key to encode and decode data.

Encryption Standards The Data Encryption Standard (DES) is an encryption standard adopted by the U.S. government. DES is the most widely used private-key encryption system. Triple Data Encryption Standard (3DES) is a more robust version of DES. The U.S. government’s National Institute of Standards and Technology (NIST) has developed a new encryption standard.

Public-Key Encryption Public-key systems provide several advantages over private-key systems: The combination of keys required to provide private messages between enormous numbers of people is small Key distribution is not a problem Public-key systems make implementation of digital signatures possible

Encryption Methods

Encryption Algorithms and Standards Different algorithms have different strengths. Digest algorithms are hash code algorithms. MD2, MD4, and MD5 are message digest algorithms. A list of significant encryption algorithms and standards are shown in Figure 11-16.

Encryption Algorithms and Standards

Secure Sockets Layer (SSL) Protocol The SSL system from Netscape is a system that provides secure information transfer through the Internet. The SSL works at the transport layer of Internet protocol. The SSL encrypts and decrypts information flowing between the two computers. All communication between SSL-enabled clients and servers is encoded.

Secure Sockets Layer (SSL) Protocol The protocol that implements SSL is HTTPS. A session key is a key used by an encryption algorithm during a single secure session. The longer the session key, the more resistant the encryption is to attack. The client and server can use a 40-bit encryption or a 128-bit encryption. The algorithm may be DES, Triple DES, or the RAS encryption algorithm.

Secure Sockets Layer (SSL) Protocol

Secure HTTP (S-HTTP) Protocol S-HTTP provides a number of security features, including: Client and server authentication Spontaneous encryption Request/response non-repudiation This protocol operates at the topmost layer of the protocol suite – the application layer.

Secure HTTP (S-HTTP) Protocol S-HTTP provides: Symmetric encryption for maintaining secret communications Public-key encryption to establish client/server authentication Message digests for data integrity S-HTTP sets up security details with special packet headers that are exchanged in S-HTTP.

Secure HTTP (S-HTTP) Protocol The headers define the type of security techniques, including: The use of private-key encryption Server authentication Client authentication Message integrity A secure envelope encapsulates a message and provides secrecy, integrity, and client/server authentication.

Ensuring Transaction Integrity Integrity violations can occur whenever a message is altered while in transit between the sender and receiver. Ensuring transaction integrity, two separate algorithms are applied to a message: Hash function Digital signature

Hash Functions Hash algorithms are one-way functions. A hash algorithm has these characteristics: It uses no secret key. The message digest it produces cannot be inverted to produce the original information. The algorithm and information about how it works are publicly available. Hash collision are nearly impossible. MD5 is an example of a hash algorithm.

Digital Signature An encrypted message digest is called a digital signature. A purchase order accompanied by the digital signature provides the merchant positive identification of the sender and assures the merchant that the message was not altered. Used together, public-key encryption, message digests, and digital signatures provide quality security for Internet transaction.

Digital Signature

Guaranteeing Transaction Delivery A denial or delay of service attack removes or absorbs resources. One way to deny service is to flood the Internet with a large number of packets. No special computer security protocol beyond TCP/IP is required as a countermeasure against denial attacks.

Protecting the Web Server The commerce server, along with the Web server, responds to requests from Web browsers through the HTTP protocol and CGI scripts. Security solutions for commerce servers: Access control and authentication Operating system controls Firewall

Access Control and Authentication Access control and authentication refers to controlling who and what has access to the commerce server. Authentication is performed using digital certificates. Web servers often provide access control list security to restrict file access to selected users.

Access Control and Authentication The server can authenticate a user in several ways: First, the certificate represents the user’s admittance voucher. Second, the sever checks the timestamp on the certificate to ensure that the certificate has not expired. Third, a sever can use a callback system to check the user’s client computer address and name. An access control list (ACL) is a list or database of people who can access the files and resources.

Access Control and Authentication

Operating System Controls Most operating systems have a username and password as well as a user authentication system in place. Access control lists and username/password protections are probably the best known of the UNIX security features.

Firewalls A firewall is a computer and software combination that is installed at the entry point of a networked system. The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat. Acting as a filter, firewalls permit selected message to flow into and out of the protected network.

Types of Firewalls Packet-filter firewalls examine all the data flowing back and forth between the trusted network. Gateway servers are firewalls that filter traffic based on the application they request. Proxy severs are firewalls that communicate with the Internet on the private network’s behalf.